US20230019494A1 - Data verification method and apparatus, computer device, and computer readable storage medium - Google Patents

Data verification method and apparatus, computer device, and computer readable storage medium Download PDF

Info

Publication number
US20230019494A1
US20230019494A1 US17/948,390 US202217948390A US2023019494A1 US 20230019494 A1 US20230019494 A1 US 20230019494A1 US 202217948390 A US202217948390 A US 202217948390A US 2023019494 A1 US2023019494 A1 US 2023019494A1
Authority
US
United States
Prior art keywords
data
target
verification
confidence
node device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/948,390
Other languages
English (en)
Inventor
Dongyan Wang
Maocai LI
Zongyou Wang
Hu Lan
Qucheng Liu
Yi Liu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Assigned to TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED reassignment TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WANG, DONGYAN, WANG, Zongyou, LIU, YI, LI, MAOCAI, LAN, Hu, LIU, Qucheng
Publication of US20230019494A1 publication Critical patent/US20230019494A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/123Tax preparation or submission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present disclosure relates to the technical field of networks, and particularly relates to a data verification method and apparatus, a computer device and a computer-readable storage medium.
  • a block chain is a decentralized database and is used for performing distributed storage on data.
  • Some embodiments of the disclose may provide a data verification method and apparatus, a computer device and a computer-readable storage medium.
  • the method and the apparatus can verify the authenticity of target data based on data with different dimensions and in different production and life links.
  • the technical solutions are as follows:
  • a data verification method may be provided, which is performed by a computer device, and the method includes: acquiring a data verification request, the data verification request including target data; acquiring at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions; and verifying the target data based on the at least one set of first data.
  • a data verification apparatus configured to include: a request acquisition module, configured to acquire a data verification request, the data verification request including target data; a data acquisition module, configured to acquire at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions; and a verification module, configured to verify the target data based on the at least one set of first data.
  • a computer device including one or more processors and one or more memories, the one or more memories storing at least one computer program, the at least one computer program being loaded and executed by the one or more processors to implement the following operations: acquiring a data verification request, the data verification request including target data; acquiring at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions; and verifying the target data based on the at least one set of first data.
  • a computer-readable storage medium may be provided, storing at least one computer program, the at least one computer program being loaded and executed by a processor to implement the following operations: acquiring a data verification request, the data verification request including target data; acquiring at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions; and verifying the target data based on the at least one set of first data.
  • a computer program product including computer instructions, the computer instructions being stored in a computer-readable storage medium.
  • a processor of a computer device reads the computer instructions from the computer-readable storage medium and executes the computer instructions to cause the computer device to perform the following operations.
  • acquiring a data verification request including target data; acquiring at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions; and verifying the target data based on the at least one set of first data.
  • FIG. 1 is a schematic structural diagram of a data verification system according to some embodiments.
  • FIG. 2 is a flowchart of a data verification method according to some embodiments.
  • FIG. 3 is a schematic hierarchical diagram of an association relationship between data according to some embodiments.
  • FIG. 4 is a schematic diagram of a data plane according to some embodiments.
  • FIG. 5 is a schematic diagram of a data source according to some embodiments.
  • FIG. 6 is a schematic diagram of a data verification method in the payment field and the tax field according to some embodiments.
  • FIG. 7 is a flowchart of data verification in the payment field and the tax field according to some embodiments.
  • FIG. 8 is a flowchart of data verification in the education field according to some embodiments.
  • FIG. 9 is a schematic structural diagram of a data verification apparatus according to some embodiments.
  • FIG. 10 is a schematic structural diagram of a terminal according to some embodiments.
  • FIG. 11 is a schematic structural diagram of a server according to some embodiments.
  • first”, “second”, and the like are used for distinguishing between same items or similar items of which effects and functions are basically the same. It is to be understood that, the “first”, “second”, and “nth” do not have a dependency relationship in logic or time sequence, and a quantity and an execution order thereof are not limited.
  • FIG. 1 is a schematic structural diagram of a data verification system according to some embodiments. As shown in FIG. 1 , the data verification system includes a plurality of first node devices 101 and a plurality of second node devices 102 .
  • the first node devices 101 have a data verification function and are capable of acquiring multi-dimensional data and verifying the target data.
  • the first node devices 101 may be node devices corresponding to institutions needing data verification, such as the node devices of the institutions like a tax institution, a loan institution and an insurance institution.
  • the first node devices 101 are node devices of third-party institutions for performing data verification.
  • multi-dimensional data is provided to data verification parties, namely the first node devices 101 , by a plurality of data sources; and after data verification is completed, the first node devices 101 will transmit verification results to the demand party like the tax institution, the loan institution and the insurance institution.
  • the plurality of second node devices 102 are node devices of different operation entities or personal users respectively and are capable of initiating data verification request.
  • the second node device 102 belonging to a certain merchant initiates a data verification request to the node device of the tax institution; and the node device belonging to a certain education institution initiates a data verification request to the node device of the third-party institution for performing data verification.
  • the first node devices 101 and the second node devices 102 can be any computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, an independent physical server, a server cluster composed of a plurality of physical servers, or a distributed system, a cloud server and the like.
  • the data verification system can include at least two subsystems.
  • One subsystem can be constructed in each of different production and life fields, for example, the node devices in the tax field form one subsystem, and the node devices in the insurance field form one subsystem.
  • the above explanation of a subsystem division method is merely an exemplary explanation, and this embodiment has no limit on which dimension is taken as the basis and how to divide the subsystem.
  • the subsystem can further include a smaller unit, and this embodiment is not limited thereto.
  • the subsystem is a block chain system, such as a subsystem 103 in FIG. 1 , each first node device 101 and each second node device 102 included in the subsystem are node devices on the block chain.
  • the subsystem is a non-block chain system, such as a subsystem 104 in FIG. 1 .
  • the first node device 101 in the subsystem 104 has an authority to performing reading, query and other operations on the data in the block chain.
  • the first node devices 101 can also be capable of storing the data to the block chain system.
  • the data verification method provided in the embodiments can be applied to various fields and can be combined with various scenarios of production and life, such as supply chain production, payment scenarios, the tax field, due diligence, notarization and the education field.
  • data with different dimensions, various fields and different time periods are combined for data verification, multi-dimensional data verification loops are formed, verification storage of all the data verification loops can be verified mutually, and an interconnected verification storage with higher complexity is formed, thus it is guaranteed that the data verification result is reliable, and the credibility of the data in the network is improved.
  • FIG. 2 is a flowchart of a data verification method according to some embodiments. The method can be applied to the above-mentioned implementation environment.
  • the data verification method includes the following operations:
  • the target data is data from any production and life field, for example, the target data is contract data, tax data, payment data, supply chain production data and the like.
  • the target data corresponds to one piece of index information, for example, the index information is a contract number, a serial number of a transaction, a certificate number of a user, a production batch of a product and the like.
  • the user or the operation entity can initiate the data verification request by a second node device.
  • the qualification data includes data for proving the repayment capability of the borrower, such as transaction flow data for purchasing production materials and selling products and asset and debt data of the borrower, but is not limited thereto.
  • the node device of the borrower is treated as the second node device to transmit the data verification request to the first node device, the data verification request including the qualification data provided by the borrower; the first node device is configured to verify the effectiveness of the qualification data and provide a certificate that the qualification data is effective data, and therefore the borrower can complete borrowing based on the certificate.
  • the first node device is the node device of the loan institution, or the first node device is the node device of an institution providing data verification service.
  • the data verification request is initiated by the node device of the loan institution, namely the loan institution is the second node device.
  • the node device of the borrower transmits a loan request to the node device of the loan institution, namely the second node device;
  • the loan request carries loan information and the qualification data of the borrower;
  • the second node device generates the data verification request in response to the loan request;
  • the target data included in the data verification request is the qualification data of the borrower;
  • the second node device transmits the data verification request to the node device of the institution providing the data verification service, namely the first node device.
  • the first node device and the second node device both belong to the loan institution.
  • the second node device is configured to process the loan request, generate the data verification request after receiving the loan request, and transmit the data verification request to the first node device for performing data verification.
  • the data source is a public chain, a private chain, a consortium chain and the like, or the data source is a database of government agencies, enterprises and the like.
  • a target association relationship is included between the at least one set of first data and the target data, moreover, the at least one set of first data and the target data are data with different dimensions, and the target association relationship is a production and life relationship.
  • the at least one set of first data includes original data, data verification storage (hash) and the like generated in each production and life link.
  • the at least one set of first data is the data acquired by performing data processing on the original data. For example, the first node device obtains original data from the data source and then performs data processing on the original data to obtain the at least one set of first data.
  • the first data carries at least one digital signature, the digital signature belonging to at least one institution, and the digital signature is used for indicating the credibility of the first data. For example, in case that the first data carries a digital signature of a certain institution, the credibility of the first data is relatively high.
  • the target association relationship includes a natural dimension relationship and a human production dimension relationship.
  • the relationships such as time, space and physical and chemical reactions belong to the natural dimension relationship, and the supply chain relationship, the identity relationship, the sovereign relationship, the education relationship and the like belong to the human production dimension relationship.
  • the target data is contract data
  • the index information of the target data is the contract number
  • the acquired first data includes the contract number
  • the first data is data in the payment field, data in the tax field and the like associated with the contract data.
  • the target data is product sales data
  • the index information of the target data is a product production batch
  • the first data is upstream and downstream data associated with the product production batch, such as raw material purchase data and product production data.
  • the target data is payment data of a certain user
  • the index information of the target data is a certificate number of the user
  • the first data is the income data, loan data and the like of the user.
  • the production and life relationship between the target data and the first data includes a plurality of hierarchies.
  • FIG. 3 is a schematic hierarchical diagram of an association relationship between data according to some embodiments.
  • target data 301 is directly associated with data 302 and data 303 of a first relationship layer and is indirectly associated with data 304 of a second relationship layer and data 305 of a third relationship layer.
  • each piece of data corresponds to a confidence, the confidence changes of the data of different hierarchies will influence the confidence of the associated data, for example, the confidence changes of the data 302 , the data 303 , the data 304 and the data 305 will influence the confidence of the target data 301 .
  • the acquired first data is data authorized to be exposed to the first node device.
  • the user requests the first node device to perform data verification, which data is authorized to the first node device is added in the data verification request.
  • data verification request For example, an identifier of the data source to which the authorized data belongs, an identifier of the field to which the authorized data belongs and the like are added in the data verification request.
  • the user can also authorize data in a certain time period, but is not limited thereto.
  • the first node device in case that the data verification request does not include information of the authorized data, requests data authorization from the user in case that acquiring the first data.
  • This embodiment of this application has no limit on data authorization manner.
  • the first node device can acquire the first data in combination with a privacy computing mode in order to avoid privacy data leakage of individuals or institutions in the data verification process.
  • the first node device acquires data through a smart contract
  • the smart contract is used for providing an association relationship between the to-be-verified data and the first data.
  • the smart contract is used for determining to acquire data having which association relationship with the target data, or the smart contract is used for determining which field the acquired data comes from, and this embodiment of this application has no specific limit on this.
  • the data verification request includes a contract identifier.
  • the smart contract called for this data verification is determined based on the request type of the data verification request, the index information of the to-be-verified data and the like, and the contract identifier of the smart contract is added into the data verification request.
  • the second node device in a loan scene, is configured to determine the smart contract called for this data verification based on the request type being loan qualification data verification and index information of to-be-verified data, certainly, the called smart contract can be determined based on indexes such as loan amount and loan type, and this embodiment of this application has no limit on this.
  • the smart contract is a public smart contract in a data verification system, or the smart contract is a smart contract belonging to a certain loan institution, but is not limited thereto.
  • the first node device is configured to acquire the at least one set of first data based on the smart contract indicated by the contract identifier in response to the data verification request including the contract identifier.
  • the first node device executes a data verification operation in response to the received data verification request.
  • the data verification operation will trigger the smart contract to run, and then the at least one set of first data is acquired by the smart contract.
  • the smart contract corresponding to the contract identifier is triggered by the first node device to run in a block chain system according to the contract identifier.
  • the smart contract is determined based on the contract identifier in the data verification request, and then the first data is acquired based on the smart contract, so that the first data can be efficiently acquired.
  • the smart contract further includes definition of layer of the association relationship between the data.
  • the association relationship layer shown in FIG. 3 is taken as an example, the first node device can obtain first data of which the association relationship with the target data belongs to the first layer to the third layer, and it is ensured that the acquired first data is closely related to the target data
  • the first node device is configured to determine the smart contract called by the data verification in response to the data verification request not including the contract identifier of the smart contract.
  • the first node device is configured to acquire a request type of the data verification request and the index information of the target data in response to the data verification request not including a contract identifier, and acquire the at least one set of data based on the request type and the smart contract corresponding to the index information.
  • the process of determining the smart contract called for this data verification by the first node device is similar to the process of determining the smart contract called for this data verification by the second node device, and no redundant description is made here.
  • the smart contract is determined based on the request type and the index information, the first data can be acquired based on the smart contract, and thus the acquiring mode of the first data is expanded.
  • the first node device is configured to match each set of first data with the target data, and determine a verification result corresponding to each set of first data, and the verification result is that the verification is passed or the verification is failed.
  • the target data is credible for this set of first data; and in case that the verification result corresponding to a certain set of first data is that the verification is failed, the target data is not credible for this set of first data.
  • the verification result is represented in the form of confidence.
  • the first node device is configured to verify the target data based on at least one type of first data to obtain the confidence of the target data.
  • the confidence is used for representing the credibility of the data, can also be referred to as the credibility, the validity, the weight and the like of the data, and can be represented as a probability value.
  • the confidence is identified in a syntax element or index and the like, and is configured in positions of a field header or a block head and the like of the data.
  • the confidence is set in the data as a syntax element of Trust base index.
  • the credibility of the target data is determined based on the value of the confidence, such as the index.
  • the confidence is distinguished based on a target association relationship, namely the production and life relationship.
  • the confidence determined based on different production and life relationships are identified as different syntax elements.
  • the target data is production data
  • the target data is verified based on data of a raw material supplier to obtain a confidence, and the confidence is identified as Supplier base index; or the target data is verified by the contract data to obtain a confidence, and the confidence is identified as Contract base index.
  • the confidence has conductivity.
  • the conductivity refers to that in case that the confidence of the data or data source referenced by a certain confidence changes, the acquired certain confidence will be influenced.
  • data in a data source A is used for acquiring the confidence of target data S in a certain time period, the confidence of the data in the data source A is X at the moment, and the confidence of the target data S acquired based on the data in the data source A is M; in another time period, the data in the data source A is confirmed as false data, at the moment, the confidence of the target data S will be influenced, and the data verification node device is configured to determine the confidence of the target data S again based on a credible data source.
  • the confidence corresponding to the associated data form a confidence plane; in case of a confidence defect in the current confidence plane, that is, a certain data or data source is counterfeited, the data involved in the confidence plane needs to be subjected to confidence evaluation according to a credible data source, and in case that all the data involved in the confidence plane are counterfeited, the confidence plane is no longer available.
  • acquiring the weight of the target data includes the following operations:
  • Operation 1 Determine the weight of the at least one set of data by the first node device.
  • the weight is used for indicating the credibility of the data, the larger the weight is, the higher the credibility of the data is, and the smaller the weight is, the smaller the credibility of the data is.
  • the weight can also be called confidence, credibility, validity and the like.
  • the weight of each piece of data is stored in the data source, and the first node device is configured to acquire the weight associated with the at least one set of first data from the at least one data source.
  • the first node device is configured to acquire the weight stored in the data source from a block chain system.
  • the weight of each piece of data is determined based on the confidence of the data verifier, the confidence of the data source, a digital signature carried by the data and other information.
  • the weight of the data uploaded by the data uploading party is relatively large; and in case that the data uploading party is an institution with relatively low confidence, the weight of the data uploaded by the data uploading party is relatively small.
  • the data carries the digital signature of a certain institution, and in case that the confidence of the institution is relatively high, the weight of the data is relatively large; and in case that the confidence of the institution is relatively low, the weight of the data is relatively small.
  • different data sources correspond to different weights
  • the first node device is configured to acquire the weight of the data source to which the at least one set of first data belongs, and determine the weight of the at least one set of first data based on the weight of the data source.
  • the weight of the data source is used as the weight of the at least one set of first data.
  • the first node device is configured to acquire the weight stored in the data source from a block chain system. The weight of the data source is directly used as the weight of the first data, thus the confidence of the first data has a direct relationship with the data source.
  • the first node device is configured to acquire a first weight associated with the at least one set of first data from the at least one data source, and acquire a second weight of the data source to which the at least one set of first data belongs. Then the first node device determines the weight of the at least one set of first data based on the first weight and the second weight. For example, the first node device performs weighted operation on the first weight and the second weight to obtain the weight of the at least one set of first data. By performing weighted summation on the first weight associated with the first data and the second weight of the data source, the weight of the first data is influenced by both the data source and other data associated with the first data, and thus the actual confidence of the first data can be accurately reflected.
  • the explanation of the method for determining the weight of the first data is an exemplary explanation of a possible implementation, and this embodiment of this application has no limit on which method is specifically adopted to determine the weight of the first data.
  • Step 2 Determine the confidence of the target data by the first node device based on the at least one set of first data and the weight of the at least one set of first data.
  • the first node device is configured to perform weighted operation based on the matching data of the target data and each set of first data and the weight of each set of first data to obtain the confidence of the target data.
  • the first node device is configured to determine the confidence based on various types of algorithms such as a linear algorithm and a log algorithm, and this embodiment of this application has no limit on this.
  • the first node device applies at least two algorithms, and performs operation based on the matching data of the target data and each set of first data, the weights of each set of first data and other data to obtain confidence computed by each algorithm.
  • verification results, namely confidence, acquired by various algorithms are accumulated, an error reporting rate corresponding to each algorithm is determined, and a target algorithm with the lowest error reporting rate is selected from the at least two algorithms, and the target algorithm is used for calculating in the subsequent data verification and target data confidence determination process.
  • different algorithms are applied to data of different types and in different fields.
  • the first node device is configured to determine the algorithm for data verification based on the target data or the acquired data. For example, data in the tax field and data in the education field adopt different algorithms to determine data verification results.
  • a correspondence between information such as the data type and the data field and the algorithm is constructed, and the correspondence is stored in the first node device.
  • the first node device is configured to determine at least one algorithm for this data verification based on the correspondence.
  • determining an algorithm adopted in the data verification process based on the target data is taken as an example, in case that the data type of the target data is the first type, or the target data belongs to the first field, it is determined that a first algorithm is applied to this data verification based on the correspondence, and based on the first algorithm, data such as the matching data of the target data and each set of first data and the weight of each set of first data are calculated.
  • the first node device is configured to determine the algorithm adopted in the data verification process based on the first data.
  • the first data acquired by the first node device can be data of different types and from different fields. For the first data of different types or different fields, the first node device can apply different algorithms to perform operation.
  • the operation that the data of the second field corresponds to the second algorithm and the operation that the data of the third field corresponds to the third algorithm are taken as examples.
  • the first data acquired by the first node device includes data from the second field and data from the third field, and the first node device is configured to determine to perform operation on the first data from the second field by the second algorithm and perform operation on the first data from the third field by the third algorithm based on the correspondence.
  • FIG. 4 is a schematic diagram of a data plane provided by an embodiment of this application, in this embodiment of this application, associated data in a block chain or other databases can form the data plane, and the confidence determination process is explained by taking the data plane shown in FIG. 4 as an example.
  • transaction data is generated based on the transaction.
  • the user in case of verifying the reference data of the user 2 , the user declares that the transaction data associated with the reference data includes TX 1 , TX 4 , TX 6 and TXm, and in case that the weight corresponding to each transaction is 1, the Trust base index (TSI) of the reference data is 4.
  • TX 1 the Trust base index
  • two parties of the transaction can generate transaction data respectively, the transaction data generated by the two transaction parties can be associated together for mutual verification; as shown in (b) of FIG. 4 , as for the transaction TX 1 , the two transaction parties are the user 2 and the user 1 , under the condition that the user 2 and the user 1 both authorize data to the opposite side, the transaction data generated by the user 2 and the transaction data generated by the user 1 in the transaction TX 1 can be associated together; and as shown in (b) of FIG. 4 , the TX 1 corresponding to the user 2 and the TX 1 corresponding to the user 1 are connected through a dotted line.
  • an association relationship can also exist, as shown in (b) of FIG.
  • the associated transaction data is represented by the same texture, and the Trust associated index (TAI) can be introduced under this condition.
  • TAI Trust associated index
  • the verification of certain data of the user 2 is taken as an example, for data of transaction TX 6 declared by the user 2 , other six pieces of data are associated, namely, data in FIG. 4 that has the same texture with TX 6 .
  • the acquisition of the associated data is also authorized by the user, and unauthorized associated data cannot be acquired.
  • the confidence of the reference data is influenced.
  • the confidence of the data provided by the user is determined based on the confidence of the user, and the higher the confidence of the user is, the higher the confidence of the data provided by the user is. For example, in (b) of FIG. 4 , the confidence of the data TX 1 declared by the user 2 is influenced by the confidence of the user 2 .
  • the confidence of the data can also be determined based on other modes, but is not limited thereto.
  • the description of the method for determining the confidence is only an exemplary description, and the embodiments are not limited as to which method is specifically adopted to determine the confidence.
  • the first node device is configured to determine a risk level of the target data based on the confidence of the target data, and transmit prompt information corresponding to the risk level to an initiator of the data verification request, namely the second node device.
  • Different confidence intervals correspond to different risk levels, and the confidence is negatively correlated with the risk level.
  • the first node device transmits the prompt information corresponding to the higher risk level to the second node device, for example, in a loan qualification audit scene, the node device for data verification transmits the prompt information to the loan institution to prompt the loan institution that the risk of the current borrower is large, and the loan institution can determine whether to continue to process the subsequent loan service for the borrower based on the risk level.
  • the first node device is configured to acquire the confidence of the target data from the block chain system, and acquire the corresponding prompt information from the block chain system based on the determined risk level.
  • the first node device is configured to determine a use priority corresponding to the target data based on the confidence of the target data, and the confidence is in positive correlation with the use priority.
  • the first receiving device transmits the use priority corresponding to the target data to the initiator of the data verification request, namely the second node device, and the second node device determines which data is preferentially used based on the use priority of the data in the subsequent service processing process.
  • the initiator can adjust the data use sequence based on the use priority, thus the service processing efficiency of the initiator is improved.
  • the technical solution provided by this embodiment of this application by acquiring data having a production and life relationship with the target data, such as data generated by upstream and downstream production links of the target data and these pieces of the data coming from different dimensions, during data verification, the authenticity of the target data can be verified based on different dimensions and different production and life links, so the data in the storage space has credibility and availability.
  • the first node device is configured to store the target data and the confidence of the target data for subsequent data verification. During storing the target data, the first node device can perform data screening based on the confidence of the data, and data with high confidence is stored.
  • the first node device is configured to store the target data and the confidence in a target storage space in an associated manner in response to the confidence of the target data being greater than a reference threshold.
  • the reference threshold is set by a developer, but is not limited thereto.
  • the reference threshold is set to be a large numerical value to determine the authenticity of the data in the target storage space.
  • the target storage space is configured to store data with a weight greater than the reference threshold in the at least one data source, namely, the data stored in the target storage space is credible data, and the data in the target storage space can form a credible data layer.
  • the first node device is configured to acquire the reference threshold from the block chain system.
  • the credible data layer can be applied to links such as data verification and data storage.
  • the first node device can directly acquire related first data from the credible data layer to verify the authenticity of the to-be-verified or to-be-stored data.
  • the authenticity of other data is verified based on the credible data, it can be effectively guaranteed that the verification result is reliable, and on the other hand, there is no need to acquire data from other data sources, thus the data verification efficiency can be improved, and the operation amount in the data reading process is reduced.
  • the first node device is configured to preferentially acquire the first data from the credible data layer, and in case of insufficient data size of the acquired first data or that the diversity of the acquired first data does not meet the verification condition, the first data is acquired from other data sources or other data sources with high weights, so as to ensure that data verification can be carried out based on multi-dimensional data in multiple fields at different time windows, and it is guaranteed that the data verification result is reliable.
  • FIG. 5 is a schematic diagram of a data source according to some embodiments.
  • a data verification node device namely the first node device, acquires data from databases 501 , block chains 502 and credible data layers 503 of various institutions for data verification.
  • the confidence of the databases of all the institutions ⁇ the confidence of the block chains ⁇ the confidence of the credible data layers, and therefore the data verification node device in more fields can adopt the data in the credible data layers for data verification.
  • the target storage space is at least one block belonging to the same block chain, or the target storage space is at least one block belonging to different block chains, or the target storage space is at least one database of a non-block chain system, or the target storage space is a storage space formed by combining blocks and databases, and this embodiment of this application has no limit on this.
  • the target data and the confidence are directly associated and stored in the target storage space, or the target data and the confidence are stored in the target storage space in a hash value form, and this embodiment of this application has no limit on this.
  • the data storage process is explained by taking the storage of the target data and the confidence in the form of the first node device, namely the block, as an example.
  • the first node device is configured to acquire the block with the highest block height in the block chain as a previous block, generate block head features of the previous block based on all information in the previous block, and perform feature value computing on the target data to be stored in the new block and the data of the confidence to obtain a block body feature value of the new block; and the first node device is configured to store the block head feature value of the previous block and the block body feature value of the new block to the block head of the new block, and store the target data, the confidence and other data to the block body of the new block, so as to generate the new block.
  • the first node device adds the new block to the tail of the block chain, thus the previous block and the new block can be associated through the block head feature value of the previous block.
  • the blocks are connected in series in the block chain, the next block is configured to verify whether the previous block is correct or not, thus the data is prevented from being tampered.
  • the description of storing the data in the block chain is an exemplary description, and the embodiments are not limited as to which method is specifically adopted to store the data in the block chain.
  • the first node device is capable of adding a pointer to the new block, and the pointer points to at least one reference block; data stored in the reference block has a target association relationship with the target data, namely, a relationship is established for related data based on the pointer, thus verification loops with different dimensions and different credibility are formed, and moreover, a multi-dimensional interconnected verification storage structure is formed.
  • the credibility data layer and the distributed account book data form an interactive structure, multi-party verification storage can realize mutual verification, thus the credibility of the data can be further guaranteed, and a reliable measurement mechanism can be established and applied to various production and life links.
  • the embodiment introduces a process of performing real-time verification on the target data based on the data in the block chain or the database by the first node device in response to receiving the data acquisition request.
  • the data verification further includes a non-real-time verification process, that is, in response to receiving the data verification request, the first node device performs real-time verification on the target data, and then performs non-real-time verification on the target data after a period of time is delayed, or the first node device performs non-real-time verification on the target data, this embodiment of this application has no limit on this.
  • the first node device in response to detecting related newly added data, is capable of verifying the target data.
  • the first node device is capable of detecting newly added data in the at least one data source, in response to detecting that second data is newly added into the at least one data source, acquiring the second data, and verifying the target data based on the second data.
  • a target association relationship is included between the second data and the target data.
  • the first node device is capable of detecting the newly added data in real time, or detecting the newly added data according to a period, and this embodiment of this application has no limit on this.
  • the target data is verified based on the newly added data, non-real-time verification can be achieved based on the newly added data, and therefore the effect of verification based on the multi-dimensional data is achieved, and the verification accuracy is improved.
  • the first node device is capable of determining which newly added data is the second data based on the smart contract. That is, the data type, the dimension, the index information and the like of the second data are defined by the smart contract. For example, in a product production scene, the purchase of raw materials and the production activity have a close association relationship; verification of data of the raw material purchase link is taken as an example, the target data is payment data of a production institution for purchasing raw materials; during this payment operation, the fund data of the production institution, production data of the previous year and the like are acquired, and real-time verification is carried out on the payment data; during producing products with the raw materials, production data will be generated, in response to the first node device detecting new production data, and the new production data is associated with the raw materials, the first node device performs non-real-time verification on the payment data, namely verification on the target data from the product production dimension, and the production data includes index information of the raw materials, a serial number of the payment data and the like.
  • the first node device performs non-real
  • the first node device is capable of determining a target moment for carrying out non-real-time verification on the target data, and then verifying the target data based on the newly added data after reaching the target moment.
  • the first node device is capable of determining a target moment based on a receiving moment of the data verification request, and the target moment and the receiving moment are separated by a reference time duration, and in response to reaching the target moment, the first node device is capable of acquiring third data from data newly added within the reference time duration and verifying the target data based on the third data.
  • a target association relationship is included between the third data and the target data.
  • the reference time duration is set by a developer, and this embodiment of this application has no limit on this.
  • the reference time duration is stored in the smart contract, and in response to reaching the target moment, the first node device triggers the smart contract to obtain the third data for data verification.
  • the contract in a supply chain scene, there are situations that a contract is signed at first and then products are delivered, the contract includes a product delivery moment, and the time duration between the product delivery moment and the current moment is determined as a delay period.
  • the first receiving device In response to the target moment after reaching the delay, namely reaching the product delivery moment, the first receiving device is capable of acquiring the third data from the data newly added during the delay period, and the third data includes product delivery data and the like; and the first node device verifies the pre-signed contract data based on the third data to ensure whether the contract is normally carried out or not.
  • non-real-time data verification can be continued until the whole production period of the product is finished, or, continued to the end of the life cycle of the product so as to verify the target data based on the data of each link in production and the multi-dimensional data in the lifecycle of the product, and multi-dimensional verification loops are formed, the verification storage of the verification loops achieves mutual verification, thus the interconnected verification storage with higher complexity is formed, and as a result, a more credible verification relationship network is formed.
  • the stored associated data from a plurality of fields is subjected to mutual verification in the same or different time windows, for example, the authenticity of payment data, tax data, supply chain data, production associated data and contract data can be mutually verified.
  • the verification process is divided into real-time verification and non-real-time verification; in the real-time verification process and the non-real-time verification process, multi-dimensional verification loops can be formed based on different dimensions of the applied data, and new verification loops can be formed by the verification storage formed by real-time verification and the verification storage formed by non-real-time verification.
  • a credibility evaluation index of data verification can be formed.
  • the plurality of verification storage can form an interconnected verification storage
  • the interconnected verification storage refers to verification storage with an association relationship in a natural dimension and a human production and life dimension, such as the verification storage associated in the natural dimensions like space, time and physical and chemical reactions, and verification storage associated in the production and life dimension like a context relationship, a supply chain relationship, an identity relationship, a sovereignty relationship, an education relationship and a tax relationship.
  • the interconnected verification storages can form an interconnected verification storage with more complex structure, and thus a more reliable data verification mode is formed.
  • the multi-dimensional interconnected verification storage structure formed by the interconnected verification storage can further guarantee the data credibility and form a reliable measurement mechanism, and a large amount of credible data can construct a credible data layer which forms a complementary structure with the distributed account book data.
  • the data with different credible dimensions are formed based on multi-dimensional data verification, joint verification is carried out based on the data with different credible dimensions, and results of credibility at different levels or counterfeiting can be acquired.
  • a multi-dimensional data plane is formed through verification storage interconnection, namely mutual verification of multi-dimensional data, so that the data verification stored in the data storage spaces such as the block chain is credible, available, non-ambiguous and complete. Moreover, based on the credible data layer, the stored data can be filtered, and the junk data is filtered out, so that the spatial redundancy of the account book data is reduced, and the data storage energy consumption and the consensus energy consumption are reduced to the maximum extent.
  • FIG. 6 is a schematic diagram of a data verification method in the payment field and the tax field according to some embodiments.
  • the payment field and the tax field includes a plurality of node devices for data verification; for example, the payment field includes a third node device 601 for data verification, the tax field includes a core verification node, namely a fourth node device 602 , the fourth node device 602 is a node device of the tax institution, and the fourth device 602 includes fifth node devices 603 of a plurality of branch institutions.
  • FIG. 7 is a flowchart of data verification in the payment field and the tax field according to some embodiments. As shown in FIG. 7 , in some embodiments, in the payment field and the tax field, the data verification process includes the following operations:
  • the transaction data is generated, and the transaction data include payment data and the like.
  • the process of performing data verification by the third node device includes the following operations:
  • Operation 1 Transmit a data verification request to the third node device 601 in the payment field by the node device of the merchant or the user in response to the completion of the transaction.
  • the data verification request includes transaction data of this transaction.
  • Operation 2 Acquire first data having a target association relationship with the transaction data from at least one data source by the third node device 601 in response to the data verification request, and verify the transaction data based on the first data.
  • the at least one data source includes a data source in the payment field or a data source in other production and life fields, such as a data source corresponding to the supply chain for producing the commodity, but is not limited thereto.
  • the transaction data includes an order serial number, index information of the product, index information of the user, index information of the merchant and the like; and the third node device is capable of acquiring data of a user dimension, a merchant dimension and a product production dimension based on the transaction data as the first data and verifying payment data of this transaction based on the multi-dimensional first data.
  • the verification result is stored.
  • the third node device is capable of synchronizing the verification result to the node device of the user and the node device of the merchant, or synchronizing the verification result to the node device of the tax field, so that in case that the merchant pays tax, the node device of the tax institution can verify the business data of the merchant.
  • the node device of the user transmits an invoicing request to the node device of the merchant in response to the operation of invoicing for the user, and the node device of the merchant directly generates the electronic invoice of this transaction in response to the invoicing request and after determining that the payment data corresponding to the invoice to be issued has passed the verification.
  • the node device in the tax field is capable of verifying the transaction data such as payment data of this transaction, and notifying the node device of the merchant to execute an invoicing step after the data verification is passed.
  • the node device of the merchant transmits a data verification request to the node device in the tax field in response to the invoicing request; the data verification request is transmitted to the fifth node device 603 of a branch institution in the tax field, and the data verification request includes payment data, the index information of the merchant, the index information of the user and the like; the node device 603 of each branch institution performs data verification based on the data verification request, transmits a data verification result to the node device of the merchant; and the node device of the merchant executes an invoicing step in response to each received verification result indicating that the verification is passed.
  • the node device of the merchant transmits the electronic invoice to the node device of the user as well as the node device of the tax institution for storing, so that the tax institution can monitor the whole process of invoicing, transferring and reimbursement, and tax payment data of the merchant can be verified in the subsequent tax payment process.
  • the electronic invoice is verified by the node device of the tax institution.
  • the tax institution is an issuer of the invoice, and the invoice issued by the tax institution carries an electronic signature of the tax institution.
  • the tax institution can verify the digital signature carried by the electronic invoice to determine the authenticity of the electronic invoice.
  • This embodiment of this application has no limit on the specific method for verifying the electronic invoice by the node device of the tax institution.
  • the node device of the tax institution transmits a data verification request to the fifth node device 603 of the branch institution in response to reaching the tax payment time, or in response to receiving a tax payment request of the merchant;
  • the data verification request includes business data and the like of the merchant in a tax payment period
  • each fifth node device 603 performs data verification, the verification result is stored and then transmitted to the node device of the tax institution; the tax institution will determine the authenticity of the tax data of the merchant based on each verification result, and determine the tax payment amount of the merchant and the like.
  • the node device or the core verification node, namely the fourth node device 602 of the tax institution can also perform data verification again based on the verification result generated by the fifth node device 603 , but is not limited thereto.
  • Data verification can be performed based on multi-dimensional data in different fields and at different time periods such as user personal dimension data, business data of merchant dimension and production data of product dimension, thus a data verification mode independent of spatial data repeatability is formed; and in this verification mode, the association relationship of data in the production and life fields can be fully utilized, online data and actual production and life are closely associated, and the authenticity of the data is verified from the perspective of actual production and life.
  • FIG. 8 is a flowchart of data verification in the education field provided by an embodiment of this application. As shown in FIG. 8 , the data verification process includes the following operations:
  • a node device of a student transmits an admission request to the node device of the education institution, and the node device of the education institution transmits the data verification request to a node device for data verification in the education field, namely the sixth node device in response to the admission request.
  • the admission request includes admission qualification data provided by the student.
  • the request is an admission application type request
  • the index information of the to-be-verified data is the certificate number, the student number and the like of the student.
  • the sixth node device is capable of determining information such as a data acquisition range and a data acquisition time range based on the request type, and acquiring the first data associated with the index information of the to-be-verified data from the data included in the data acquisition range, and the data acquisition range includes a data acquisition field and dimensions. For example, the sixth node device acquires the data including the certificate number of the student as the first data, and acquires the data of family members of the student as the first data.
  • the sixth node device is capable of performing real-time data verification based on the acquired first data, and transmitting the data verification result to the node device of the education institution, and the node device of the education institution is capable of determining the admission qualification of the student based on the admission qualification data of the student and the data verification result.
  • the sixth node device can also be capable of performing non-real-time data verification.
  • the student submits a next-stage admission application to the education institution in the middle of the fourth term
  • the education institution audits the admission qualification data currently submitted by the student and also audits test data of the student at the end of the fourth term, and under the condition, non-real-time data verification needs to be carried out.
  • the sixth node device reacquires the first data and verifies the new test data.
  • the sixth node device is capable of updating the stored verification result based on the verification result of the new test data, so that the timeliness of the verification result is ensured.
  • data verification can also be carried out by the node device of the education institution.
  • the education institution corresponds to a plurality of node devices, including node devices used for processing the admission request and node devices used for carrying out data verification; and the node devices used for processing the admission request generate the data verification request in response to receiving the admission request and transmit the data verification request to the node devices used for carrying out data verification.
  • FIG. 9 is a schematic structural diagram of a data verification apparatus according to some embodiments. As shown in FIG. 9 , the apparatus includes:
  • a request acquisition module 901 configured to acquire a data verification request, the data verification request including target data;
  • a data acquisition module 902 configured to acquire at least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions;
  • a verification module 903 configured to verify the target data based on the at least one set of first data.
  • the data acquisition module 902 may be configured to:
  • the smart contract is used for providing an association relationship between the target data and the first data.
  • the data acquisition module 902 may be configured to:
  • the apparatus may further include:
  • a detection module configured to detect newly added data in the at least one data source
  • the data acquisition module 902 further configured to acquire, in response to detecting that second data is newly added into the at least one data source, the second data and the target data having a target association relationship;
  • the verification module 903 further configured to verify the target data based on the second data.
  • the apparatus may further include:
  • a moment determination module configured to determine a target moment based on a receiving moment of the data verification request, the target moment and the receiving moment being separated by a reference time duration;
  • the data acquisition module 902 further configured to acquire third data from data newly added within the reference time duration in response to reaching the target moment, the third data and the target data having a target association relationship;
  • the verification module 903 configured to verify the target data based on the third data.
  • the verification module 903 may be configured to:
  • the verification module 903 includes:
  • a result acquisition sub-module configured to acquire a verification result corresponding to the at least one set of first data
  • a first determination sub-module configured to determine a weight of the at least one set of first data
  • a second determination sub-module configured to determine the confidence of the target data based on the verification result corresponding to the at least one set of first data and the weight of the at least one set of first data.
  • the first determination sub-module may be configured to:
  • the first determination sub-module is configured to:
  • the first determination sub-module is configured to:
  • the apparatus further includes:
  • a storage module configured to store the target data and the confidence to a target storage space in response to the confidence being greater than a reference threshold, the target storage space being configured to store data with a weight greater than the reference threshold in the at least one data source.
  • the apparatus further includes:
  • a risk determination module configured to determine a risk level of the target data based on the confidence of the target data
  • a first transmitting module configured to transmit prompt information corresponding to the risk level to an initiator of the data verification request.
  • the apparatus may further include:
  • a priority determination module configured to determine a use priority corresponding to the target data based on the confidence of the target data, the confidence being in positive correlation with the use priority
  • a second transmitting module configured to transmit the use priority corresponding to the target data to an initiator of the data verification request.
  • the apparatus of some embodiments by acquiring data having a production and life relationship with the target data, such as data generated by upstream and downstream production links of the target data and these pieces of the data coming from different dimensions, during data verification, the authenticity of the target data can be verified based on different dimensions and different production and life links, so the data in the storage space has credibility and availability.
  • the data verification apparatus When the data verification apparatus provided in the foregoing embodiment performs data verification, only divisions of the foregoing functional modules are described by using an example. During actual application, the foregoing functions may be allocated to and completed by different functional modules according to requirements, that is, the internal structure of the apparatus is divided into different functional modules, to complete all or some of the foregoing described functions.
  • the data verification apparatus and data verification method embodiments provided in the foregoing embodiments belong to one conception. For the specific implementation process, refer to the method embodiments, and details are not described herein again.
  • FIG. 10 is a schematic structural diagram of a terminal provided by an embodiment of this application.
  • the terminal 1000 may be a smartphone, a tablet computer, a moving picture experts group audio layer III (MP3) player, a moving picture experts group audio layer IV (MP4) player, a notebook computer, or a desktop computer.
  • MP3 moving picture experts group audio layer III
  • MP4 moving picture experts group audio layer IV
  • the terminal 1000 may also be referred to as user equipment, a portable terminal, a laptop terminal, a desktop terminal, or by another name.
  • the terminal 1000 includes one or more processors 1001 or one or more memories 1002 .
  • the processor 1001 may include one or more processing cores, and may be, for example, a 4-core processor or a 10-core processor.
  • the processor 1001 may be implemented by using at least one hardware form of a digital signal processor (DSP), a field-programmable gate array (FPGA), and a programmable logic array (PLA).
  • DSP digital signal processor
  • FPGA field-programmable gate array
  • PDA programmable logic array
  • the processor 1001 may also include a main processor and a co-processor.
  • the main processor is a processor for processing data in a wake-up state, also referred to as a central processing unit (CPU).
  • the coprocessor is a low-power processor configured to process data in a standby state.
  • the processor 1001 may be integrated with a graphics processing unit (GPU) that is responsible for rendering and drawing content needing to be displayed by a display screen.
  • the processor 1001 may further include an artificial intelligence (AI) processor.
  • the AI processor is configured to process computing operations related to machine learning.
  • the memory 1002 may include one or more computer-readable storage media that may be non-transitory.
  • the memory 1002 may further include a high-speed random access memory and a nonvolatile memory, for example, one or more disk storage devices or flash storage devices.
  • a non-transitory computer-readable storage medium in the memory 1002 is configured to store at least one piece of program code, the at least one piece of program code being configured to be executed by the processor 1001 to implement the following operations.
  • the data verification request including target data
  • At least one set of first data from at least one data source, the at least one set of first data and the target data having a target association relationship, and the at least one set of first data and the target data being data with different dimensions;
  • the acquiring at least one set of first data from at least one data source may include:
  • the smart contract being used for providing an association relationship between the target data and the first data.
  • the acquiring at least one set of first data from at least one data source may include:
  • the method may further include:
  • the method may further include:
  • the verifying the target data based on the at least one set of first data may include:
  • the determining a confidence of the target data may include:
  • the determining a weight of the at least one set of first data may include:
  • the determining a weight of the at least one set of first data may include:
  • the determining a weight of the at least one set of first data may include:
  • the method may further include:
  • the target storage space being configured to store data with a weight greater than the reference threshold in the at least one data source.
  • the method may further include:
  • the method may further include:
  • the terminal 1000 may include a peripheral interface 1003 and at least one peripheral.
  • the processor 1001 , the memory 1002 , and the peripheral interface 1003 may be connected by using a bus or a signal cable.
  • Each peripheral may be connected to the peripheral interface 1003 by using a bus, a signal cable, or a circuit board.
  • the peripheral device includes: a display screen 1004 , and a power supply 1005 .
  • the peripheral interface 1003 may be configured to connect the at least one peripheral related to input/output (I/O) to the processor 1001 and the memory 1002 .
  • the processor 1001 , the memory 1002 and the peripheral interface 1003 are integrated on the same chip or circuit board.
  • any or both of the processor 1001 , the memory 1002 , and the peripheral interface 1003 may be implemented on an independent chip or circuit board, which is not limited in this embodiment.
  • the display screen 1004 is configured to display a user interface (UI).
  • the UI may include a graph, a text, an icon, a video, and any combination thereof.
  • the display screen 1004 is further capable of collecting touch signals on or above a surface of the display screen 1004 .
  • the touch signal may be inputted, as a control signal, to the processor 1001 for processing.
  • the display screen 1005 may be further configured to provide a virtual button and/or a virtual keyboard, also referred to as a soft button and/or a soft keyboard.
  • the display screen 1004 may be a flexible display screen disposed on a curved surface or a folded surface of the terminal 1000 . Even, the display screen 1004 may also be set to a non-rectangular irregular pattern, that is, a special-shaped screen.
  • the display screen 1004 may be made of a material such as a liquid crystal display (LCD) or an organic light-emitting diode (OLED).
  • the power supply 1005 is configured to supply power to components in the terminal 1000 .
  • the power supply 1005 may be an alternating-current power supply, a direct-current power supply, a disposable battery, or a rechargeable battery.
  • the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery.
  • the rechargeable battery may be further configured to support a fast charge technology.
  • FIG. 10 does not constitute a limitation on the terminal 1000 and that the terminal 1000 may include more or fewer assemblies than those shown in the figure, a combination of some assemblies, or different assembly arrangements.
  • FIG. 11 is a schematic structural diagram of a server according to some embodiments.
  • the server 1100 may vary greatly because a configuration or performance varies, and may include one or more central processing units (CPU) 1101 and one or more memories 1102 .
  • the one or more memories 1102 store at least one piece of program code, and the at least one piece of program code is loaded and executed by the one or more processors 1101 to implement the data verification methods provided in the foregoing various method embodiments.
  • the server 1100 may also have a wired or wireless network interface, a keyboard, an input/output interface and other components to facilitate input/output.
  • the server 1100 may also include other components for implementing device functions. Details are not described herein.
  • a computer-readable storage medium for example, a memory including at least one piece of program code is further provided.
  • the at least one piece of program code may be executed by a processor to implement the data verification method in the foregoing embodiments.
  • the computer-readable storage medium may be a read-only memory (ROM), a random access memory (RAM), a compact disc ROM (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, or the like.
  • a computer program product including computer instructions, the computer instructions being stored in a computer-readable storage medium.
  • a processor of a computer device reads the computer instructions from the computer-readable storage medium and executes the computer instructions to cause the computer device to perform the data verification method.
  • the program may be stored in a computer-readable storage medium.
  • the storage medium may be a read-only memory, a magnetic disk, an optical disc, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
US17/948,390 2020-11-24 2022-09-20 Data verification method and apparatus, computer device, and computer readable storage medium Pending US20230019494A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN202011332117.1 2020-11-24
CN202011332117.1A CN113034265B (zh) 2020-11-24 2020-11-24 数据验证方法、装置、计算机设备及计算机可读存储介质
PCT/CN2021/126744 WO2022111196A1 (zh) 2020-11-24 2021-10-27 数据验证方法、装置、计算机设备及计算机可读存储介质

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/126744 Continuation WO2022111196A1 (zh) 2020-11-24 2021-10-27 数据验证方法、装置、计算机设备及计算机可读存储介质

Publications (1)

Publication Number Publication Date
US20230019494A1 true US20230019494A1 (en) 2023-01-19

Family

ID=76458989

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/948,390 Pending US20230019494A1 (en) 2020-11-24 2022-09-20 Data verification method and apparatus, computer device, and computer readable storage medium

Country Status (3)

Country Link
US (1) US20230019494A1 (zh)
CN (1) CN113034265B (zh)
WO (1) WO2022111196A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034265B (zh) * 2020-11-24 2024-05-07 腾讯科技(深圳)有限公司 数据验证方法、装置、计算机设备及计算机可读存储介质
CN113793174A (zh) * 2021-09-01 2021-12-14 北京爱笔科技有限公司 数据关联方法、装置、计算机设备和存储介质
CN114936918B (zh) * 2022-05-20 2024-03-29 天道金科股份有限公司 基于区块链的风控数据跟踪方法、终端设备及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201812274D0 (en) * 2018-07-27 2018-09-12 Leone Philip System and method for management of chains of custody
CN110427376B (zh) * 2019-07-31 2022-04-05 北京米弘科技有限公司 区块链的溯源系统、方法、计算机设备及计算机可读存储介质
CN111125245A (zh) * 2019-11-21 2020-05-08 深圳壹账通智能科技有限公司 基于区块链的数据处理方法、装置及存储介质
CN111212074B (zh) * 2020-01-02 2024-03-01 腾讯科技(深圳)有限公司 基于区块链的资格认定方法、装置、设备及存储介质
CN111597562B (zh) * 2020-04-08 2023-06-23 平安科技(深圳)有限公司 基于区块链的链上数据验证方法、装置、设备和存储介质
CN113034265B (zh) * 2020-11-24 2024-05-07 腾讯科技(深圳)有限公司 数据验证方法、装置、计算机设备及计算机可读存储介质

Also Published As

Publication number Publication date
WO2022111196A1 (zh) 2022-06-02
CN113034265A (zh) 2021-06-25
CN113034265B (zh) 2024-05-07

Similar Documents

Publication Publication Date Title
US20230019494A1 (en) Data verification method and apparatus, computer device, and computer readable storage medium
US20230106484A1 (en) Cryptographic Asset Collateral Management
US20190188706A1 (en) Transference tracking
US11966894B2 (en) Apparatus for cryptographic resource transfer based on quantitative assessment regarding non-fungible tokens
US20210312461A1 (en) Data sharing methods, apparatuses, and devices
US8600870B2 (en) Distributed scoring of data transactions
US11100093B2 (en) Blockchain-based recording and querying operations
EP4181010A1 (en) Data reuse computing architecture
Xie et al. Primary node election based on probabilistic linguistic term set with confidence interval in the PBFT consensus mechanism for blockchain
CN117035980A (zh) 资源借调评估方法、装置、计算机设备和存储介质
CN110991923B (zh) 架构构建方法、装置、电子设备和介质
CN109471790A (zh) 送核参数比对方法及装置、计算机装置及可读存储介质
US20240195642A1 (en) Systems and methods for providing a decentralized processing network
US20230267513A1 (en) Ai and blockchain-based warehouse use system and method of using warehouse using the same
US11574336B1 (en) Apparatus for secure decentralized rebate management
US11924200B1 (en) Apparatus and method for classifying a user to an electronic authentication card
US11823100B1 (en) Apparatus and method for evaluating assignments
US11836692B1 (en) Apparatus and methods for executing a transaction protocol for rights to non-fungible tokens (NFTs)
US20240054488A1 (en) Systems and methods for generating aggregate records
US20240185221A1 (en) Using partitions within a distributed database
Khatiri Blockchain Recommender Systems using Blockchain Data
CN116029828A (zh) 信息处理方法、装置和计算机设备
CN117390000A (zh) 资源交换数据处理方法、系统、计算机设备和存储介质
Vaquero LITERATURE REVIEW OF CREDIT CARD FRAUD DETECTION WITH MACHINE LEARNING
CN118133085A (zh) 交互任务的控制方法、装置和计算机设备

Legal Events

Date Code Title Description
AS Assignment

Owner name: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, DONGYAN;LI, MAOCAI;WANG, ZONGYOU;AND OTHERS;SIGNING DATES FROM 20220909 TO 20220919;REEL/FRAME:061481/0850

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION